Securing PHI Sample Clauses

Securing PHI. Unless it is not feasible under the circumstances, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies in order to render PHI that Provider creates, receives, maintains or transmits on behalf of Plan, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. In addition, unless it is not feasible under the circumstances, Provider shall ensure that any agent, including, but not limited to, Subcontractors or vendors to whom it provides Plan’s PHI will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act, the Secretary, or other Law specifies with respect to rendering Plan’s PHI unusable, unreadable or indecipherable to unauthorized individuals.
AutoNDA by SimpleDocs
Securing PHI. FACT shall secure any and all electronic PHI covered by this Addendum in accordance with the guidance issued by the Secretary entitled “Guidance Specifying the Technologies and Methodologies that Render Protected Health Information Unusable, Unreadable, or Indecipherable to Unauthorized Individuals,” as amended and updated from time to time. In addition, with respect to PHI covered by this Addendum, FACT shall comply with guidance issued by the Secretary under the authority of HITECH Section 13401(c). FACT shall use best efforts to avoid the creation or storage of paper PHI.
Securing PHI. Business Associate shall secure all PHI to the extent necessary to insure that it is not deemed Unsecured PHI. Business Associate will accomplish this by use of a technology standard that renders PHI unusable, unreadable, or indecipherable to unauthorized individuals and is accredited by the American National Standards Institute and is consistent with guidance issued by the Secretary of Health and Human Services specifying the technologies and methodologies that render PHI unusable unreadable or indecipherable to unauthorized individuals, including the use of standards developed under Section 13101 of the HITECH Act.
Securing PHI. Unless specifically agreed to by the Covered Entity, Business Associate agrees to implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act or other Law specifies in order to render PHI that Business Associate creates, receives, maintains or transmits on behalf of the Covered Entity, unusable, unreadable, or indecipherable to unauthorized individuals, thereby making the PHI secure. Business Associate shall ensure that any agent, including, but not limited to, subcontractors or vendors to whom it provides the Covered Entity’s PHI, will implement, in a reasonable and appropriate manner, the technologies and methodologies the HITECH Act or other Law specifies with respect to rendering the Covered Entity’s PHI unusable, unreadable or indecipherable to unauthorized individuals.
Securing PHI. To the extent applicable, Business Associate shall secure any and all EPHI covered by this Agreement in accordance with any requirements issued by the Secretary as amended and updated from time to time. In addition, with respect to PHI covered by this Agreement, Business Associate shall comply with any requirements issued by the Secretary under the authority of HITECH Section 13401(c). Business Associate shall use best efforts to avoid the creation or storage of paper PHI.

Related to Securing PHI

  • Securing Physical Facilities DST shall maintain systems located in DST facilities that host Fund Data or provide services under the Agreement in an environment that is designed to be physically secure and to allow access only to authorized individuals. A secure environment includes the availability of onsite security personnel on a 24 x 7 basis or equivalent means of monitoring locations supporting the delivery of services under the Agreement.

  • Preservative-treated Wood Containing Arsenic Grantee may not purchase preservative-treated wood products containing arsenic in the performance of this Agreement unless an exemption from the requirements of Chapter 13 of the San Francisco Environment Code is obtained from the Department of the Environment under Section 1304 of the Code. The term “preservative-treated wood containing arsenic” shall mean wood treated with a preservative that contains arsenic, elemental arsenic, or an arsenic copper combination, including, but not limited to, chromated copper arsenate preservative, ammoniacal copper zinc arsenate preservative, or ammoniacal copper arsenate preservative. Grantee may purchase preservative-treated wood products on the list of environmentally preferable alternatives prepared and adopted by the Department of the Environment. This provision does not preclude Grantee from purchasing preservative-treated wood containing arsenic for saltwater immersion. The term “saltwater immersion” shall mean a pressure-treated wood that is used for construction purposes or facilities that are partially or totally immersed in saltwater.

  • Statutory Indebtedness Restrictions Neither the Company nor any of its Subsidiaries is subject to regulation under the Federal Power Act, the Investment Company Act of 1940, or any other foreign, federal or state statute or regulation which limits its ability to incur indebtedness or its ability to consummate the transactions contemplated hereby.

  • State Approval of Replacement Personnel The Engineer may not replace the project manager or key personnel without prior consent of the State. The State must be satisfied that the new project manager or other key personnel is qualified to provide the authorized services. If the State determines that the new project manager or key personnel is not acceptable, the Engineer may not use that person in that capacity and shall replace him or her with one satisfactory to the State within forty-five (45) days.

  • Holding and Using Posted Collateral (i) Eligibility to Hold Posted Collateral; Custodians. Counterparty and its Custodian will be entitled to hold Posted Collateral pursuant to Paragraph 6(b); provided that the following conditions applicable to it are satisfied: (1) Counterparty is not a Defaulting Party; and (2) Posted Collateral may be held only in the following jurisdictions: New York State or such other state in the United States in which the Counterparty is located; and (3) the account is segregated from all other accounts held by the Counterparty and its Custodian. (4) Party B may appoint as Custodian (A) the entity then serving as Trustee under the Pooling Agreement or (B) any other entity if such entity (or, to the extent applicable, the parent company or credit support provider) shall have a long-term senior unsecured debt rating by S&P of at least “A” or a short-term senior unsecured debt rating of at least “A-1” by S&P. Initially, the Custodian for Counterparty is: None

  • Legally Required Disclosures If a subpoena or other legal process concerning Confidential Information is served upon any party hereto pertaining to the subject matter hereof, the party served shall notify the other party immediately, the other party shall cooperate with the party served, at the other party’s expense, in any effort to contest the validity of such subpoena or other legal process. This Section 10.3 shall not be construed in any way to limit any party’s ability to satisfy any disclosure of its relationship with the other party required by any governmental authority.

  • Government Approval, Regulation, etc No authorization or approval or other action by, and no notice to or filing with, any governmental authority or regulatory body or other Person is required for the due execution, delivery or performance by the Borrower of this Amendment.

  • Additional Federally Required Orders/Directives Both parties agree that they will comply with the following laws and directives, where applicable: 11.20.1 Executive Order 11061, as amended, which directs the Secretary of HUD to take all action which is necessary and appropriate to prevent discrimination by agencies that utilize federal funds. 11.20.2 Public Law 88-352, Title VI of the Civil Rights Act of 1964, which provides that no person in the United States shall, on the basis of race, color, national origin, or sex, be excluded from participation in, denied the benefits of, or subjected to discrimination under any program or activity which receives federal financial assistance. The Agency hereby extends this requirement to the Contractor and its private contractors. Specific prohibited discriminatory actions and corrective action are described in Chapter 2, Subtitle C, Title V of the Anti-Drug Abuse Act of 1988 (42 U.S.C. 19901 et. seq.). 11.20.3 Public Law 90-284, Title VIII of the Civil Rights Act of 1968., popularly known as the Fair Housing Act, which provides for fair housing throughout the United States and prohibits any person from discriminating in the sale or rental of housing, the financing of housing or the provision of brokerage services, including in any way making unavailable or denying a dwelling to any person because of race, color, religion, sex, or national origin. Pursuant to this statute, the Agency requires that the Contractor administer all programs and activities, which are related to housing and community development in such a manner as affirmatively to further fair housing. 11.20.4 The Age Discrimination Act of 1975, which prohibits discrimination on the basis of age. 11.20.5 Anti-Drug Abuse Act of 1988 (42 U.S.C. 11901 et. seq.). 11.20.6 HUD Information Bulletin 909-23 which is the following: 11.20.6.1 Notice of Assistance Regarding Patent and Copyright Infringement; 11.20.6.2 Clean Air and Water Certification; and,

  • Additional Statutory and Regulatory Obligations Vendor acknowledges that it has the following additional obligations under Section 2-d with respect to any Protected Data received from the District, and that any failure to fulfill one or more of these statutory or regulatory obligations will be deemed a breach of the Master Agreement and the terms of this Data Sharing and Confidentiality Agreement: (a) To limit internal access to Protected Data to only those employees or subcontractors that are determined to have legitimate educational interests within the meaning of Section 2-d and the Family Educational Rights and Privacy Act (FERPA); i.e., they need access in order to assist Vendor in fulfilling one or more of its obligations to the District under the Master Agreement. (b) To not use Protected Data for any purposes other than those explicitly authorized in this Data Sharing and Confidentiality Agreement and the Master Agreement to which this Exhibit is attached. (c) To not disclose any Protected Data to any other party, except for authorized representatives of Vendor using the information to carry out Vendor’s obligations to the District and in compliance with state and federal law, regulations and the terms of the Master Agreement, unless: (i) the parent or eligible student has provided prior written consent; or (ii) the disclosure is required by statute or court order and notice of the disclosure is provided to the District no later than the time of disclosure, unless such notice is expressly prohibited by the statute or court order. (d) To maintain reasonable administrative, technical, and physical safeguards to protect the security, confidentiality, and integrity of Protected Data in its custody. (e) To use encryption technology to protect Protected Data in its custody while in motion or at rest, using a technology or methodology specified by the Secretary of the U.S. Department of Health and Human Services in guidance issued under Section 13402(H)(2) of Public Law 111-5. (f) To adopt technologies, safeguards and practices that align with the NIST Cybersecurity Framework. (g) To comply with the District’s policy on data security and privacy, Section 2-d and Part 121. (h) To not sell Protected Data nor use or disclose it for any marketing or commercial purpose or facilitate its use or disclosure by any other party for any marketing or commercial purpose or permit another party to do so. (i) To notify the District, in accordance with the provisions of Section 5 of this Data Sharing and Confidentiality Agreement, of any breach of security resulting in an unauthorized release of Protected Data by Vendor or its assignees or subcontractors in violation of applicable state or federal law, the District’s Bill of Rights for Data Security and Privacy, the District’s policies on data security and privacy, or other binding obligations relating to data privacy and security contained in the Master Agreement and this Exhibit. (j) To cooperate with the District and law enforcement to protect the integrity of investigations into the breach or unauthorized release of Protected Data. (k) To pay for or promptly reimburse the District for the full cost of notification, in the event the District is required under Section 2-d to notify affected parents, students, teachers or principals of a breach or unauthorized release of Protected Data attributed to Vendor or its subcontractors or assignees.

  • Reporting Obligations and Regulatory Approvals Applicable laws and regulations may require holders and beneficial owners of Shares, including the Holders and Beneficial Owners of ADSs, to satisfy reporting requirements and obtain regulatory approvals in certain circumstances. Holders and Beneficial Owners of ADSs are solely responsible for determining and complying with such reporting requirements and obtaining such approvals. Each Holder and each Beneficial Owner hereby agrees to make such determination, file such reports, and obtain such approvals to the extent and in the form required by applicable laws and regulations as in effect from time to time. Neither the Depositary, the Custodian, the Company or any of their respective agents or affiliates shall be required to take any actions whatsoever on behalf of Holders or Beneficial Owners to determine or satisfy such reporting requirements or obtain such regulatory approvals under applicable laws and regulations.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!